Geo-Location Spoofing on E-Scooters; Threat Analysis and Prevention Framework
Year 2023,
Volume: 11 Issue: 4, 364 - 372, 22.12.2023
Ahmet Saim Yılmaz
,
Haydar Cukurtepe
,
Emin Kugu
Abstract
Geo-location services are widely used by numerous applications and devices. E-scooters have become one of the recent prevalent devices that uses these services. Geo-location services are highly vulnerable to spoofing attacks. Spoofing detection and prevention techniques have been researched for time. Most of the researches have been focused on smart devices such as smartphones, UAVs or other vehicles. Geo-location spoofing also poses significant threats on e-scooters for user security, costs and reliability. In this study, we analyze the location spoofing threats on e-scooter sharing environment and propose a spoofing detection framework. The proposed framework monitors e-scooter’s location and tracks significant changes. The proposed service based framework is able to provide different levels of awareness, and enabled capabilities.
References
- [1] Jindal, K.; Dalal, S.; Sharma, K. K. “Analyzing Spoofing Attacks in Wireless Networks”. 2014 Fourth International Conference on Advanced Computing Communication Technologies: (February 2014), 398–402. doi:10.1109/ACCT.2014.46. ISBN 978-1-4799-4910- 6. S2CID 15611849.
- [2] Getting the User’s Location, Apple Developer Documentation. [Online]. [Accessed: 10-Dec-2022]. Available: https://developer.apple.com/documentation/corelocation/gettingtheuserslocation.
- [3] Geolocation API, Google. [Online]. [Accessed: 10-Dec-2022]. Available: https://developers.google.com/maps/documentation/geolocation/overview
- [4] EUROPEAN GNSS (GALILEO) OPEN SERVICE Issue 2.0, January 2021 NAVIGATION SOLUTIONS POWERED BY EUROPE SIGNALIN-SPACE INTERFACE CONTROL DOCUMENT
- [5] N. Vinayaga-Sureshkanth, R. Wijewickrama, A. Maiti, and M. Jadliwala, “Security and privacy challenges in upcoming Intelligent Urban Micromobility Transportation Systems,” Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, (2020). doi:10.1145/3375706.3380559
- [6] A. S. Yılmaz, H. Çukurtepe and E. Kuğu, "Analysis of Location Spoofing Threats on E-Scooter Sharing," 2022 30th Signal Processing and Communications Applications Conference (SIU), Safranbolu, Turkey, 2022, pp. 1-4, doi: 10.1109/SIU55565.2022.9864946.
- [7] Jovanovic, A., et al.: Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. 2014 IEEE/ION Position, Location and Navigation Symposium (PLANS), (May 2014), pp. 43–49. doi:10.1109/PLANS.2014.6851501
- [8] F. Formaggio, S. Ceccato, F. Basana, N. Laurenti, S. Tomasin, GNSS Spoofing Detection Techniques by Cellular Network Cross-check in Smartphones, in: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. doi:10.33012/2019.17076.
- [9] Khan, F.; Al-Atawi, A.A.; Alomari, A.; Alsirhani, A.; Alshahrani, M.M.; Khan, J.; Lee, Y. Development of a Model for Spoofing Attacks in Internet of Things. Mathematics (2022), 10, 3686. https://doi.org/10.3390/math 10193686
- [10] Tzeng C.L. Global Wi-Fi Enabled Devices Shipment Forecast, 2020–2024. Market Intelligence Consulting Institute (MIC); Taiwan, China: (2020)
- [11] D. -K. Lee et al.,” Detection of GNSS Spoofing using NMEA Messages,” 2020 European Navigation Conference (ENC), (2020), pp. 1-10, doi: 10.23919/ENC48637.2020.9317470.
- [12] Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. A Practical GPS Location Spoofing Attack in Road Navigation Scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications (HotMobile ’17). Association for Computing Machinery, New York, NY, USA, (2017) 85–90. https://doi.org/10.1145/3032970.3032983
- [13] Celestin M, Achara JP, Cunche M, “Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing,”Acm Conference on Security Privacy in Wireless Mobile Networks, (2015). doi:10.1145/2766498.2766521
- [14] R. V. Karpe and S. Kulkarni, “Software defined radio based Global Positioning System jamming and spoofing for vulnerability analysis,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), (2020). doi:10.1109/ICESC48915.2020.9155565
- [15] Ma, Q.; Yang, H.; Mayhue, A.; Sun, Y.; Huang, Z.; Ma, Y. E-Scooter Safety: The Riding Risk Analysis Based on Mobile Sensing Data. Accid. Anal. Prev. (2021), 151, 105954. https://doi.org/10.1016/j.aap.2020.105954
- [16] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., Basin, D. Short paper: Detection of GPS spoofing attacks in power grids. WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2014), 99–104. https://doi.org/10.1145/2627393.2627398
- [17] Wang, K. Time and Position Spoofing with Open Source Projects. (2015).
- [18] Meng, L., Yang, L., Yang, W., amp; Zhang, L. A survey of GNSS spoofing and anti-spoofing technology. Remote Sensing, 14(19), 4826, (2022). https://doi.org/10.3390/rs14194826
- [19] Huang, J., Lo Presti, L., Motella, B., amp; Pini, M. GNSS spoofing detection: Theoretical Analysis and performance of the ratio test metric in open sky. ICT Express, 2(1), (2016), 37–40. https://doi.org/10.1016/j.icte.2016.02.006.
- [20] Ye, A., Li, Q., Zhang, Q., Cheng, B. Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags. IEEE Access, (2020), 8, 39768–39780. https://doi.org/10.1109/ACCESS.2020.2976189
Year 2023,
Volume: 11 Issue: 4, 364 - 372, 22.12.2023
Ahmet Saim Yılmaz
,
Haydar Cukurtepe
,
Emin Kugu
References
- [1] Jindal, K.; Dalal, S.; Sharma, K. K. “Analyzing Spoofing Attacks in Wireless Networks”. 2014 Fourth International Conference on Advanced Computing Communication Technologies: (February 2014), 398–402. doi:10.1109/ACCT.2014.46. ISBN 978-1-4799-4910- 6. S2CID 15611849.
- [2] Getting the User’s Location, Apple Developer Documentation. [Online]. [Accessed: 10-Dec-2022]. Available: https://developer.apple.com/documentation/corelocation/gettingtheuserslocation.
- [3] Geolocation API, Google. [Online]. [Accessed: 10-Dec-2022]. Available: https://developers.google.com/maps/documentation/geolocation/overview
- [4] EUROPEAN GNSS (GALILEO) OPEN SERVICE Issue 2.0, January 2021 NAVIGATION SOLUTIONS POWERED BY EUROPE SIGNALIN-SPACE INTERFACE CONTROL DOCUMENT
- [5] N. Vinayaga-Sureshkanth, R. Wijewickrama, A. Maiti, and M. Jadliwala, “Security and privacy challenges in upcoming Intelligent Urban Micromobility Transportation Systems,” Proceedings of the Second ACM Workshop on Automotive and Aerial Vehicle Security, (2020). doi:10.1145/3375706.3380559
- [6] A. S. Yılmaz, H. Çukurtepe and E. Kuğu, "Analysis of Location Spoofing Threats on E-Scooter Sharing," 2022 30th Signal Processing and Communications Applications Conference (SIU), Safranbolu, Turkey, 2022, pp. 1-4, doi: 10.1109/SIU55565.2022.9864946.
- [7] Jovanovic, A., et al.: Multi-test detection and protection algorithm against spoofing attacks on GNSS receivers. 2014 IEEE/ION Position, Location and Navigation Symposium (PLANS), (May 2014), pp. 43–49. doi:10.1109/PLANS.2014.6851501
- [8] F. Formaggio, S. Ceccato, F. Basana, N. Laurenti, S. Tomasin, GNSS Spoofing Detection Techniques by Cellular Network Cross-check in Smartphones, in: Proceedings of the 32nd International Technical Meeting of the Satellite Division of the Institute of Navigation, ION GNSS+ 2019. doi:10.33012/2019.17076.
- [9] Khan, F.; Al-Atawi, A.A.; Alomari, A.; Alsirhani, A.; Alshahrani, M.M.; Khan, J.; Lee, Y. Development of a Model for Spoofing Attacks in Internet of Things. Mathematics (2022), 10, 3686. https://doi.org/10.3390/math 10193686
- [10] Tzeng C.L. Global Wi-Fi Enabled Devices Shipment Forecast, 2020–2024. Market Intelligence Consulting Institute (MIC); Taiwan, China: (2020)
- [11] D. -K. Lee et al.,” Detection of GNSS Spoofing using NMEA Messages,” 2020 European Navigation Conference (ENC), (2020), pp. 1-10, doi: 10.23919/ENC48637.2020.9317470.
- [12] Kexiong Curtis Zeng, Yuanchao Shu, Shinan Liu, Yanzhi Dou, and Yaling Yang. A Practical GPS Location Spoofing Attack in Road Navigation Scenario. In Proceedings of the 18th International Workshop on Mobile Computing Systems and Applications (HotMobile ’17). Association for Computing Machinery, New York, NY, USA, (2017) 85–90. https://doi.org/10.1145/3032970.3032983
- [13] Celestin M, Achara JP, Cunche M, “Short: Device-to-Identity Linking Attack Using Targeted Wi-Fi Geolocation Spoofing,”Acm Conference on Security Privacy in Wireless Mobile Networks, (2015). doi:10.1145/2766498.2766521
- [14] R. V. Karpe and S. Kulkarni, “Software defined radio based Global Positioning System jamming and spoofing for vulnerability analysis,” 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC), (2020). doi:10.1109/ICESC48915.2020.9155565
- [15] Ma, Q.; Yang, H.; Mayhue, A.; Sun, Y.; Huang, Z.; Ma, Y. E-Scooter Safety: The Riding Risk Analysis Based on Mobile Sensing Data. Accid. Anal. Prev. (2021), 151, 105954. https://doi.org/10.1016/j.aap.2020.105954
- [16] Yu, D. Y., Ranganathan, A., Locher, T., Capkun, S., Basin, D. Short paper: Detection of GPS spoofing attacks in power grids. WiSec 2014 - Proceedings of the 7th ACM Conference on Security and Privacy in Wireless and Mobile Networks, (2014), 99–104. https://doi.org/10.1145/2627393.2627398
- [17] Wang, K. Time and Position Spoofing with Open Source Projects. (2015).
- [18] Meng, L., Yang, L., Yang, W., amp; Zhang, L. A survey of GNSS spoofing and anti-spoofing technology. Remote Sensing, 14(19), 4826, (2022). https://doi.org/10.3390/rs14194826
- [19] Huang, J., Lo Presti, L., Motella, B., amp; Pini, M. GNSS spoofing detection: Theoretical Analysis and performance of the ratio test metric in open sky. ICT Express, 2(1), (2016), 37–40. https://doi.org/10.1016/j.icte.2016.02.006.
- [20] Ye, A., Li, Q., Zhang, Q., Cheng, B. Detection of Spoofing Attacks in WLAN-Based Positioning Systems Using WiFi Hotspot Tags. IEEE Access, (2020), 8, 39768–39780. https://doi.org/10.1109/ACCESS.2020.2976189